Gage Skidmore/FlickrAny cyber-security adviser worth their salt will tell you not to include personal information in an email – that’s just common sense. Sending someone a message with your home address, or your medical and employment information, is a quick and easy way to have your identity stolen, and a fast track to spending an afternoon canceling your credit cards. But what about when you’re emailing a government official? Say, for example, the governor of Florida, Jeb Bush.

In an effort to promote his upcoming book (which is probably an effort to promote an upcoming national campaign), Jeb Bush previewed the first chapter, featuring email correspondence between himself and any constituent who felt like reaching out to his personal address, Jeb@jebbush.com. The conversations that appear in the book are mostly unedited, and paint a picture of the governor as a communicative, helpful, and frank politician. The problem isn’t those conversations that appear in the book, it’s all of the remaining emails, which anyone is free to browse at their own leisure, sorted conveniently by date.

Digging through the archive of hundreds of thousands of message between Jeb and his constituents, you can find a shocking wealth of unredacted personal data. The most innocuous is probably the email address of anyone who reached out to him, and it gets worse from there. Phone numbers, home and work addresses, medical information for children, some named explicitly, as presented by their parents. Personal finance and tax issues sometimes make their way into messages, with some people even including their social security numbers.

As you scroll through Jeb’s responses, you’ll occasionally stumble across a disclaimer that reads something like this: “Please note: Florida has a very broad public records law. Most written communications to or from state officials regarding state business are public records available to the public and media upon request. Your e-mail communications may therefore be subject to public disclosure.”

It reads a lot like those email disclaimers people often include in their own signatures, warning recipients not to share the contents of an email. In reality, these statements have never been taken into consideration in any sort of legal proceeding — they’re pretty much useless, save for easing the nervousness of the sender. Bush’s disclaimer serves as a reminder of Florida’s Sunshine laws, which grant the public access to just about everything happening behind the scenes in government. Transparency has been an important part of Florida law since 1909, with the definition of “public” being considered carefully, and often. In fact, it’s the whole reason that there isn’t any legal recourse for citizens whose personal information has been shared — their correspondence with the governor is considered public record.

Jeb Bush is acutely familiar with Sunshine laws, as well as their importance to the press and citizens of Florida. Immediately after taking office he scheduled a brief meeting with the Democratic and Republican state congressional leaders, to which he didn’t invite any members of the press. They immediately insinuated he was hiding something, and in an email with a former gubernatorial employee, he responds “I wonder if this email is a matter of public record??????????????????” Ironically enough, the email found its way into the very first chapter of his book.

Bush team has been quick to respond to complaints by redacting information and removing messages entirely when needed. He also accepted the resignation of his chief technical officer, Ethan Czahor, who caused controversy a number of times in the last few years by tweeting racist and misogynist sentiments. Maybe most importantly of all, they pulled the download links for the sortable databases of the emails. But on the Internet, it’s a lot easier to let the cat out of the bag than it is to get it back in.

Google is slowly but surely giving its apps a refresh, modernizing them and ensuring that they're easy to use. The latest app to get a redesign is the Gmail app for Android, which has been redesigned with a few tweaks.

Marriott has created an online form to help you find out if your data was stolen in the massive Starwood hack that came to light toward the end of 2018. But take note, it requires you to submit a bunch of personal details.

Prime Video provides subscribers with access to a host of fantastic films, but sorting through the catalog can be an undertaking. Luckily, we've done the work for you. Here are the best movies on Amazon Prime Video right now.

Looking for a new show to binge? Lucky for you, we've curated a list of the best shows on Netflix, whether you're a fan of outlandish anime, dramatic period pieces, or shows that leave you questioning what lies beyond.

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.

Sometimes you just want Chrome to show a little personality and ditch the grayscale for something a little more lively. Lucky for you, we've sorted through the Chrome Web Store to find best Chrome themes available.

Compatibility issues between Microsoft Windows and Apple MacOS may have diminished sharply over the years, but that doesn't mean they've completely disappeared. Here's how to make an external drive work between both operating systems.

Intel's Ice Lake may end up launching before the architecture it was supposed to replace. With hints of more announcements about the chip design in the very near future, here's everything you need to know about Ice Lake.

Our Mac Pro 2019 rumor roundup covers all the news, leaks, and rumors about Apple's new machine, set to be announced sometime in 2019. Here's what Apple has said, what the experts think, and what we're likely to see with the new Mac Pro.

WinRAR, a piece of Windows software for managing archival formats, has been harboring a vulnerability for nearly two decades, potentially allowing malicious software to insert items into a computer's startup folder without user permission.

Looking to learn how to uninstall Steam games? You've come to the right place. In this guide, we walk you through the process step by step, whether you want Steam to do it for you or handle the process manually.